Back close

Secretly Shared QR Code and Its Applications

Publication Type : Book Chapter

Thematic Areas : TIFAC-CORE in Cyber Security

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2

Source : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 473-480). Springer India.

Campus : Coimbatore

School : School of Engineering, Centre for Cybersecurity Systems and Networks

Center : TIFAC CORE in Cyber Security

Department : cyber Security

Year : 2015

Abstract : pQuick response codes (QR codes) are widely being used for various applications such as user authentication and advertisements. The data in QR codes can easily be read with the help of a QR code reader application installed in a smartphone with camera. Here, we cannot neglect the possibility of an attacker tampering the QR code data. For example, in authentication, the attacker can forge the text password. In order to avoid such attacks as well as hide this data from the public, we propose a secret sharing scheme with reversing. This scheme not only splits the QR code into different shares, but also allows us to perfectly reconstruct back the original QR code./p

Admissions Apply Now